Welcome to SearchSecurity.com's supplement to the latest issue of Information Security magazine. Now that you've read the story in the magazine, continue to explore these topics on SearchSecurity.com.

THIS MONTH ON SEARCHSECURITY.COM

Wireless Security Lunchtime LearningSpend your lunch hour learning the essentials of wireless LAN security. Four 20-minute webcasts, supporting technical tips and quizzes provide comprehensive coverage of the issues corporations face regarding WLAN security, whether they choose to deploy a WLAN infrastructure or prohibit WLAN access altogether. GO TO WIRELESS SECURITY LUNCHTIME LEARNINGHow to protect your businessLike pen testing, Google hacking is useful both for the attacker and the potential victim. Learn how to use Google hacking to discover sensitive information about your business that's exposed on the Internet.
Free online trainingSearchSecurity.com offers a variety of free courses to help you meet the increasingly challenging job of keeping your enterprise secure and compliant. Visit our Security School Course Catalog to access previous courses and get a sneak peak at future courses.
Tools for securing the SDLCJoin us on March 30 at noon ET when Michael Jordan, a SystemExperts consultant, will discuss the key steps of the Software Development Lifecycle, and evaluate tools and techniques to improve the security of applications.Preregister today

Compliance Guide for Managers You read about the biggest compliance challenges security managers are confronting and the tools, processes and policies they are using as they try to meet the demands of SOX. So, where does your organization stand when it comes to SOX compliance? Visit our SOX Security School and complete our SOX Scorecard to assess your organization's compliance efforts and identify your weaknesses.
>>GO TO THE SOX SCORECARD>>GO TO SOX SECURITY SCHOOL

Secure from the Start Architecture, design, coding and testing all offer opportunities to make your company's applications or services more secure. Planning for security in software development is essential. To be truly effective, you must start early in the process. The magazine armed you with a roadmap for secure software coding, including an overview of the skills programmers need to demonstrate and the types of products best suited to work in various development environments.

Download a checklist of secure coding tactics that can be printed and distributed to developers or used to check code. >>GET THE CHECKLIST

Then join us for an hour-long live webcast on March 30, 2006, at noon ET to find out how vulnerable your applications are to attacks, and evaluate common tools and techniques to improve the security of your applications. >>CLICK TO PREREGISTER

Unplugged In this month's issue, you read an evaluation of four leading IDS/IPS products on their ability to detect and locate rogue APs, track and block possible attack sources, manage and enforce policy, interoperate with WLAN infrastructures, support 802.11a/b/g and Bluetooth, report and log, and their ease of use. Now expand your knowledge of wireless intrusion detection systems and learn how to secure your WLAN in our free Wireless Security Lunchtime Learning. >>GO TO WIRELESS SECURITY LUNCHTIME LEARNING

Google Hacking You learned how black hats are using Google's information-gathering power as a reconnaissance tool for attacks on corporate systems and data, and measures you can take to protect your business from such an attack. Now learn how to run automatic Google scans against your company's domain. >>CLICK TO READ THE TIP

PING: William Pelgrin In an interview with Information Security magazine, the director of New York's Office of Cyber Security and Critical Infrastructure Coordination explains how a mock phishing exercise against 10,000 state employees provided a measure of user awareness. >>CLICK TO READ THE INTERVIEW

0 comments

Register

Login

Forgot your password?

Your password has been sent to:

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy